Download presentation
Presentation is loading. Please wait.
Published byJarno Majanlahti Modified over 6 years ago
1
The University of Adelaide, School of Computer Science
30 December 2018 Computer Networks, 5th Edition Chapter 6 Congestion Control and Resource Allocation Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer
2
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.1 A potential bottleneck router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
3
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.2 Multiple flows passing through a set of routers. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
4
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.3 Ratio of throughput to delay as a function of load. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
5
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.4 One four-hop flow competing with three one-hop flows. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
6
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.5 (a) FIFO queuing; (b) tail drop at a FIFO queue. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
7
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.6 Round-robin service of four flows at a router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
8
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.7 Example of fair queuing in action: (a) Packets with earlier finishing times are sent first; (b) sending of a packet already in progress is completed. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
9
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.8 Packets in transit during additive increase, with one packet being added each RTT. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
10
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.9 Typical TCP sawtooth pattern. Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
11
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.10 Packets in transit during slow start. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
12
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.11 Behavior of TCP congestion control. Colored line = value of CongestionWindow over time; solid bullets at top of graph = timeouts; hash marks at top of graph = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
13
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.12 Fast retransmit based on duplicate ACKs. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
14
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.13 Trace of TCP with fast retransmit. Colored line = CongestionWindow; solid bullet = timeout; hash marks = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
15
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.14 Computing average queue length at a router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
16
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.15 Weighted running average queue length. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
17
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.16 RED thresholds on a FIFO queue. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
18
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.17 Drop probability function for RED. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
19
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.18 Congestion window versus observed throughput rate (the three graphs are synchronized). Top, congestion window; middle, observed throughput; bottom, buffer space taken up at the router. Colored line = CongestionWindow; solid bullet = timeout; hash marks = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
20
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.19 Trace of TCP Vegas congestion-avoidance mechanism. Top, congestion window; bottom, expected (colored line) and actual (black line) throughput. The shaded area is the region between the α and β thresholds. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
21
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.20 An audio application. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
22
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.21 A playback buffer. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
23
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.22 Example distribution of delays for an Internet connection. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
24
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.23 Taxonomy of applications. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
25
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.24 Two flows with equal average rates but different token bucket descriptions. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
26
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.25 Making reservations on a multicast tree. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
27
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.26 RED with In and Out drop probabilities. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
28
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.27 Diagram for Exercise 6. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
29
Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.28 TCP trace for Exercise 27. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.